메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Securacy: An empirical investigation of android applications' network usage, privacy and security

Author keywords

Applications; Context; Experience sampling; Network; Privacy

Indexed keywords


EID: 84962016918     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2766498.2766506     Document Type: Conference Paper
Times cited : (50)

References (56)
  • 6
    • 80051969895 scopus 로고    scopus 로고
    • Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices
    • IEEE
    • Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In Symposium on Security and Privacy. IEEE, 2011, 96-111.
    • (2011) Symposium on Security and Privacy , pp. 96-111
    • Becher, M.1    Freiling, F.C.2    Hoffmann, J.3    Holz, T.4
  • 11
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H. and Perrig, A. Security and privacy in sensor networks. Computer 36, 10, 2003, 103-105.
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 13
    • 3042780572 scopus 로고    scopus 로고
    • Using the experience sampling method to evaluate ubicomp applications
    • Consolvo, S. and Walker, M. Using the experience sampling method to evaluate ubicomp applications. IEEE Pervasive Computing 2, 2, 2003, 24-31.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.2 , pp. 24-31
    • Consolvo, S.1    Walker, M.2
  • 14
    • 84961997478 scopus 로고    scopus 로고
    • retrieved 1/05/2015
    • Dashboards for Android Developers. https://developer.android.com/about/dashboards/index.html, retrieved 1/05/2015.
    • Dashboards for Android Developers
  • 22
    • 84885222364 scopus 로고    scopus 로고
    • Revisiting human-battery interaction with an interactive battery interface
    • ACM
    • Ferreira, D., Ferreira, E., Goncalves, J., Kostakos, V. and Dey, A.K. Revisiting Human-Battery Interaction with an Interactive Battery Interface. In Ubicomp. ACM, 2013, 563-572.
    • (2013) Ubicomp , pp. 563-572
    • Ferreira, D.1    Ferreira, E.2    Goncalves, J.3    Kostakos, V.4    Dey, A.K.5
  • 23
    • 85031499848 scopus 로고    scopus 로고
    • AWARE: Mobile context instrumentation framework
    • Ferreira, D., Kostakos, V. and Dey, A.K. AWARE: mobile context instrumentation framework. Frontiers in ICT 2:6, (2015) DOI: 10.3389/fict.2015.00006.
    • (2015) Frontiers in ICT , vol.2 , pp. 6
    • Ferreira, D.1    Kostakos, V.2    Dey, A.K.3
  • 26
    • 84910653435 scopus 로고    scopus 로고
    • A field study of run-time location access disclosures on android smartphones
    • 2014
    • Fu, H., Yang, Y., Shingte, N., Lindqvist, J. and Gruteser, M. A Field Study of Run-Time Location Access Disclosures on Android Smartphones. In USEC'14. 2014.
    • USEC'14
    • Fu, H.1    Yang, Y.2    Shingte, N.3    Lindqvist, J.4    Gruteser, M.5
  • 27
    • 84894862758 scopus 로고    scopus 로고
    • Quantifying and classifying covert communications on android
    • Hill, R., Hansen, M. and Singh, V. Quantifying and Classifying Covert Communications on Android. Mobile Networks and Applications 19, 1, 2014, 79-87.
    • Mobile Networks and Applications 19 , vol.1 , Issue.2014 , pp. 79-87
    • Hill, R.1    Hansen, M.2    Singh, V.3
  • 29
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • LCA-ARTICLE-2004-007
    • Hubaux, J.-P., Capkun, S. and Luo, J. The security and privacy of smart vehicles. IEEE Security & Privacy Magazine 2, LCA-ARTICLE-2004-007, 2004, 49-55.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , pp. 49-55
    • Hubaux, J.-P.1    Capkun, S.2    Luo, J.3
  • 30
    • 84962032764 scopus 로고    scopus 로고
    • retrieved 14/03/2014
    • IANA TCP/IP port specifications. http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?&page=126, retrieved 14/03/2014.
    • IANA TCP/IP Port Specifications
  • 32
    • 84868375110 scopus 로고    scopus 로고
    • A conundrum of permissions: Installing applications on an android smartphone
    • Springer Berlin Heidelberg
    • Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012, 68-79.
    • (2012) Financial Cryptography and Data Security , pp. 68-79
    • Kelley, P.G.1    Consolvo, S.2    Cranor, L.F.3    Jung, J.4
  • 34
    • 80054056884 scopus 로고    scopus 로고
    • Who's your best friend?: Targeted privacy attacks in location-sharing social networks
    • ACM
    • Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., et al. Who's your best friend?: targeted privacy attacks in location-sharing social networks. In Ubicomp. ACM, 2011, 177-186.
    • (2011) Ubicomp , pp. 177-186
    • Kostakos, V.1    Venkatanathan, J.2    Reynolds, B.3    Sadeh, N.4
  • 36
  • 37
    • 84962006012 scopus 로고    scopus 로고
    • retrieved 05/09/2014
    • Moto X: the Google phone that's always listening. http://www.telegraph.co.uk/technology/google/10217856/Moto-X-the-Google-phone-thats-always-listening.html, retrieved 05/09/2014.
    • Moto X: The Google Phone That's Always Listening
  • 38
    • 84921046658 scopus 로고    scopus 로고
    • Realization of a user-centric, privacy preserving permission framework for android
    • Nauman, M., Khan, S., Othman, A.T. and Musa, S. Realization of a user-centric, privacy preserving permission framework for Android. Security Comm. Networks 8, 3, 2014, 368-382.
    • (2014) Security Comm. Networks , vol.8 , Issue.3 , pp. 368-382
    • Nauman, M.1    Khan, S.2    Othman, A.T.3    Musa, S.4
  • 40
    • 84962002028 scopus 로고    scopus 로고
    • retrieved 17/09/2014
    • The new Moto X is 'always listening' - and so is the NSA!. http://www.techradar.com/us/news/phone-and-communications/mobile-phones/the-new-moto-x-is-always-listening-and-so-is-the-nsa-1170553, retrieved 17/09/2014.
    • The New Moto X is 'always Listening'- and So is the NSA!
  • 45
    • 84957795003 scopus 로고    scopus 로고
    • retrieved 11/09/2014
    • Review app permissions. https://support.google.com/googleplay/answer/6014972?p=app-permissions&rd=1, retrieved 11/09/2014.
    • Review App Permissions
  • 46
    • 67650293214 scopus 로고    scopus 로고
    • Understanding and capturing people's privacy policies in a mobile social networking application
    • Sadeh, N., Hong, J., Cranor, L., Fette, I., et al. Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal Ubiquitous Comput 13, 6, 2009, 401-412.
    • Personal Ubiquitous Comput 13 , vol.6 , Issue.2009 , pp. 401-412
    • Sadeh, N.1    Hong, J.2    Cranor, L.3    Fette, I.4
  • 49
    • 84907413882 scopus 로고    scopus 로고
    • The company you keep: Mobile malware infection rates and inexpensive risk indicators
    • International World Wide Web Conferences Steering Committee
    • Truong, H.T.T., Lagerspetz, E., Nurmi, P., Oliner, A.J., et al. The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators. In Proceedings of the 23rd International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 2014, 39-50.
    • (2014) Proceedings of the 23rd International Conference on World Wide Web , pp. 39-50
    • Truong, H.T.T.1    Lagerspetz, E.2    Nurmi, P.3    Oliner, A.J.4
  • 51
  • 53
    • 79961035462 scopus 로고    scopus 로고
    • AppJoy: Personalized mobile application discovery
    • New York, New York, USA
    • Yan, B. and Chen, G. AppJoy: personalized mobile application discovery. In MobiSys. New York, New York, USA, 2011, 113-126.
    • (2011) MobiSys , pp. 113-126
    • Yan, B.1    Chen, G.2
  • 55
    • 77954845334 scopus 로고    scopus 로고
    • Privacy and security for online social networks: Challenges and opportunities
    • IEEE
    • Zhang, C., Sun, J., Zhu, X. and Fang, Y. Privacy and security for online social networks: challenges and opportunities. Network, IEEE 24, 4, 2010, 13-18.
    • (2010) Network , vol.24 , Issue.4 , pp. 13-18
    • Zhang, C.1    Sun, J.2    Zhu, X.3    Fang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.